View all newsletters
Receive our newsletter - data, insights and analysis delivered to you
  1. Technology
  2. Data
February 21, 2010

Thales teams up IBM to integrate Tivoli Key Lifecycle Manager into TEMS

Consolidates and automates management of encryption keys for heterogeneous storage environments

By CBR Staff Writer

Thales, a provider of information systems and communications security, said that it is working with IBM to integrate Tivoli Key Lifecycle Manager into Thales Encryption Manager for Storage (TEMS 2.0) to provide customers with a hardened tamper-resistant key management offering.

Thales said that TEMS will be expanded to address the key management requirements of the IBM storage portfolio of products, to provide operational and security benefits to both IBM and Thales customers, including the convenience of a hardware appliance and standards-based key management controls needed to protect and store data.

According to Thales, the TEMS 2.0 consolidates and automates the management of encryption keys for heterogeneous storage environments offering unified auditable security controls. It supports the draft IEEE P1619.3 key management standard, and enables customers to manage keys across a range of encryption-enabled storage devices and end-points, in particular IBM’s LTO4 tape and DS8000 disk storage systems.

Gordon Arnold, security software architect and product manager at IBM Tivoli software, said: “Key management provides a cryptographic layer of security that helps clients meet the stringent internal and external compliance mandates that require proper storage and protection of data and information.

Content from our partners
Sherif Tawfik: The Middle East and Africa are ready to lead on the climate
What to look for in a modern ERP system
How tech leaders can keep energy costs down and meet efficiency goals

“The integration of Thales Encryption Manager with IBM Tivoli Key Lifecycle Manager will provide our customers with the choice between hardware secured and software key management to help them centralise and better manage their storage security processes.”

Topics in this article :
Websites in our network
Select and enter your corporate email address Tech Monitor's research, insight and analysis examines the frontiers of digital transformation to help tech leaders navigate the future. Our Changelog newsletter delivers our best work to your inbox every week.
  • CIO
  • CTO
  • CISO
  • CSO
  • CFO
  • CDO
  • CEO
  • Architect Founder
  • MD
  • Director
  • Manager
  • Other
Visit our privacy policy for more information about our services, how New Statesman Media Group may use, process and share your personal data, including information on your rights in respect of your personal data and how you can unsubscribe from future marketing communications. Our services are intended for corporate subscribers and you warrant that the email address submitted is your corporate email address.
THANK YOU